Effect Of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Author: J.H. Cho, I.R. Chen and P.G. Feng.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
A Survey of Secure Wireless Ad Hoc Routing
An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs Rolando Menchaca-Mendez J.J. Garcia-Luna-Aceves 280N Seminar: 4/28/2008.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Specification-based Intrusion Detection Michael May CIS-700 Fall 2004.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Power saving technique for multi-hop ad hoc wireless networks.
ECE 5214 Modeling and Evaluation of Computer Networks Kavya Sagi.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Reliability of Wireless Sensors with Code Attestation for Intrusion Detection Presented by: Yating Wang.
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Ad Hoc Network.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Attacks and Counter Defense Mechanisms for Cyber-Physical Systems 1 Taha Hassan Lulu Wang CS 5214 Fall 2015.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
Presented by Edith Ngai MPhil Term 3 Presentation
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Presentation transcript:

Effect Of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Author: J.H. Cho, I.R. Chen and P.G. Feng IEEE Transactions on Reliability, Vol. 59, No. 1, 2010, pp [P1] (4/6 - Presented by R. Mitchell, C. Jian, and A.H. Saoud)

Outline Introduction (A.H. Saoud) System Model (A.H. Saoud) Performance Model (R. Mitchell) Parameterization (R. Mitchell) Numerical Results, and Analysis (C. Jian) Applicability & Conclusion (C. Jian) 2

Introduction Analyzing the effect of intrusion detection system (IDS) techniques on the reliability of a mission-oriented group communication in mobile ad hoc networks. Knowing design conditions for employing intrusion detection system (IDS) techniques that can enhance the reliability, and thus prolong the lifetime of GCS. Limitations. Techniques (prevention, detection, recovery). 3

Introduction Applying model-based quantitative analysis to security analysis. MTTSF is a measure to reflect the expected system lifetime, representing a measure against loss of service availability, or system integrity. Identify the optimal rate at which IDS should be executed to maximize the system lifetime. 4

Introduction Consider the effect of security threats, and counter IDS techniques on system lifetime of a mission-oriented GCS in MANETs. Mathematical models to identify the optimal intrusion detection rate at which MTTSF is maximized through analyzing the tradeoff between positive and negative effects of IDS. Show that the analysis methodology developed is generally applicable to varying network conditions. 5

System Model The notion of a mobile group is defined based on “connectivity.” The GCS, and its constituent mobile groups are “mission-oriented” Mission execution is an application-level goal built on top of connectivity-oriented group communications.  leave rate, rejoin rate, Mobility rate  /( +  ) probability node is in any group  /( +  ) probability node is not in any group 6

System Model - Confidentiality Shared symmetric (group) key for secure group communications, to encrypt the message sent by a member to others in the group for confidentiality. Rekeying upon group member join/leave/eviction, or group partition/merge events to preserve secrecy. Group Diffie-Hellman (GDH), a contributory key agreement protocol, used for group key rekeying for decentralized control, and to eliminate a single point of failure. Identify optimal intrusion detection intervals to maximize MTTSF, leading to improved service availability. 7

System Model - Authentication Each member has a private key, and public key, available for authentication. The public keys of all group members preloaded into every node. No certificate authority (CA), or key revocation. A node’s public key therefore serves as the identifier of the node 8

System Model - IDS Host-based IDS, each node performs local detection to determine if a neighboring node has been compromised. The effectiveness of IDS techniques applied: the false negative probability (P1), and false positive probability (P2). Voting-based IDS: m nodes each preinstalled with host-based IDS -ve (a) evicting good nodes by always voting “no” to good nodes (b) keeping bad nodes in the system by al- ways voting “yes” to bad nodes. 9

System Model –IDS Tolerance False negative probability, and false positive probability. Calculated based on (a) the per-node false negative, and positive probabilities of host-based IDS in each node; (b) the number of vote-participants selected to vote for or against a target node. (c) an estimate of the current number of compromised nodes For the selection of participants, each node periodically exchanges its routing information, location, and identifier with its neighboring nodes. 10

System Model – Tolerance 2 With respect to a target node, all neighbor nodes that are within a number of hops from the target node are candidates as vote- participants. A coordinator is selected randomly by introducing a hashing function that takes in the identifier of a node concatenated with the current location of the node as the hash key. The node with the smallest returned hash value would then become the coordinator 11

System Model – Tolerance 3 Coordinator selects m nodes randomly and broadcasts the list of m nodes. Any node not following the protocol raises a flag as a potentially compromised node, and may get itself evicted when it is being evaluated as a target node. The vote-participants are known to other nodes, and based on votes received, they can determine whether or not a target node is to be evicted. 12

System Model – Failure Def System Failure Definition 1 (SF1), which is when the GCS fails when any mobile group fails; System Failure Definition 2 (SF2), which is when the GCS fails when all mobile groups fail. Evaluation of the effect of the two system failure definitions on the MTTSF of the system. 13

System Module – Failure Con. Condition 1 (C1): undetected member requests and obtains data using the group key. (leading to the loss of system integrity Condition 2 (C2):more than 1/3 of group member nodes are compromised, but undetected by IDS. This failure condition follows the Byzantine Failure model (loss of availability of system service). 14

System Model - Connectivity Single hop, single group, not experiencing group merge or partition events. SF1 and SF2 are the same. Multi-hops so that there are multiple groups in the system due to group partition/merge. 15

System Module – Reliability MTTSF: indicates the lifetime of the GCS before it fails. A GCS fails when one mobile group fails, or when all mobile groups fail in the mission-oriented GCS, as defined by SF1 or SF2. a mobile group fails when either C1 or C2 is true. A lower MTTSF implies a faster loss of system integrity, or availability. 16

Outline Introduction (A.H. Saoud) System Model (A.H. Saoud) Performance Model (R. Mitchell) Parameterization (R. Mitchell) Numerical Results, and Analysis (C. Jian) Applicability & Conclusion (C. Jian) 17

Performance Model SPN Places Transitions Review 18

19

Places groups N G uncompromised members T m undetected compromised nodes UC m evicted nodes DC m well detected compromised false detected uncompromised security failure GF absorbing 20

Transitions group partition T PAR group merge T MER member compromise T CP false detection T FA confidentiality violation (C1) T DRQ rate = λ q · mark(UC m ) · p1 well detection T IDS rekey T RK 21

Review Why is T DRQ rate scaled by p1? Where is the Byzantine failure (C2) transition into GF? T BYZ from UC m with multiplicity mark(T m ) / 2 Derive SF2 reward model 22

Parameterization T RK rate T CP rate IDS interval δ P fp and P fn 23

T RK rate For one group: b GDH / datalink rate For multiple groups: 3b GDH (N-1) / datalink rate 24

T CP rate adversary becomes more aggressive when they have the upper hand λ c · (mark(T m ) + mark(UC m ) / mark(T m )) 25

IDS interval δ IDS becomes more aggressive as it detects more compromised nodes (T IDS ) -1 · (N init / (mark(T m ) + mark(U cm )) 26

27

Outline Introduction (A.H. Saoud) System Model (A.H. Saoud) Performance Model (R. Mitchell) Parameterization (R. Mitchell) Numerical Results, and Analysis (C. Jian) Applicability & Conclusion (C. Jian) 28

Parameterization & Metric MTTSF IDS interval (T IDS )Single-hop 5s sSF1=SF2 Multi-hop 5s sSF1, SF2 # of vote-participants (m)3,5,7 group communication rate q 1/30s 1/1min 1/2min 1/4min 1/8min base compromising rate c 1/3h 1/6h 1/12h 1/d 1/2d 29

Tids on MTTSF under m (1) Optimal T IDS increasing MTTSF as T IDS increases, negative effects of IDS are mostly due to false positives decreasing MTTSF as T IDS increases, more compromised nodes will remain in the system 30

Tids on MTTSF under m (2) large m reduce the possibility of collusion by compromised nodes, thus get high MTTSF, small m, the false alarm probability is relative large, resulting in a small MTTSF 31

Tids on MTTSF under m (3) MTTSF in single-hop is comparatively higher than that in multi-hop due to the difference of node density (adverse effect) MTTSF under SF2 > MTTSF under SF1 32

Sensitivity of MTTSF on q(1) q is low, a high MTTSF, q is high, a low MTTSF depends on the frequency of data-leak attack q increases, optimal T IDS becomes smaller the adverse effect of false positives dominates when T IDS is sufficiently small 33

Sensitivity of MTTSF on q(2) Optimal TIDS in single-hop < Optimal T IDS in multi-hop, because single-hop need to perform IDS more frequently to prevent potentially more compromised nodes MTTSF under SF2 > MTTSF under SF1 34

Sensitivity of MTTSF on c (1) IDS is more effective when c is sufficiently low 35

Sensitivity of MTTSF on c (2) single-hop MANETs have higher MTTSF because more members exist in single- hop MANETs the optimal T IDS is smaller in single-hop MANETs under identical conditions because the system tends to execute IDS more frequently 36

Conclusion a mathematic model input: operational conditions, system failure definitions, attacker behaviors output: the optimal rate to execute intrusion detection to enhance the system reliability of GCS results TIDS , as m , node density  or group size , q  c  37

Questions?